Tribhuvan University
Institute of Science and Technology
2079
Bachelor Level / fifth-semester / Science
Computer Science and Information Technology( CSC316 )
Cryptography
Full Marks: 60 + 20 + 20
Pass Marks: 24 + 8 + 8
Time: 3 Hours
Candidates are required to give their answers in their own words as far as practicable.
The figures in the margin indicate full marks.
Group A
Answer any TWO
Illustrate the concept of security policy and mechanism with an example. Differentiate between block cipher and stream cipher. Explain the process of key expansion in AES.
Describe the properties of hash functions. Discuss how hash value is generated using SHA-1 algorithm.
Show that Z 5is a field. John publishes the ElGamal public key (q, α, YA) =(101, 2, 14). Jane desired to send the secret message CSIT to John. Using the equivalence A = 0, B=1, … , Z=25, encrypt the message using John’s public key. Use a random number k = 4.
Group B
Answer any EIGHT
Differentiate between Trojan horse and virus. Describe any two types of intruders.
The message “IMOGUN” was encrypted with a Playfair cipher using keyword “GALOIS”. Decrypt the message.
How encryption is done using IDEA algorithm.
Describe the services provided by Pretty Good Privacy protocol to secure email.
Define challenge response system. Why do we need Kerberos?
How direct digital signature different from arbitrated digital signature? How digital signature generation and verification is done using RSA.
Why do we need discrete logarithm over normal logarithm? Find out whether 3 is primitive root of 7 or not.
Which one is more secure, monoalphabetic cipher or poly alphabetic cipher? Justify. Using rail fence cipher encrypt the text “LEARNING AND TEACHING ARE DIFFERENT” using 3 as rails.
What is the condition of for two integers, x and y, to be relatively prime? Find whether 61 is prime or not using Miller-Rabin algorithm.